| 6.0 | Mapping Solutions to Key Issues p. 14
|
| 6.1 | Solution #1: Authorization of AI/ML model retrieving p. 14
| 6.1.1 | Introduction p. 14
|
| 6.1.2 | Solution details p. 14
| 6.1.2.1 | Authorization of AI/ML model retrieving from NWDAF p. 14
|
| 6.1.2.2 | Authorization of AI/ML model retrieving from ADRF p. 14
|
|
| 6.1.3 | Evaluation p. 15
|
|
| 6.2 | Solution #2: Authorization and Authentication of ML model transfer p. 15
|
| 6.3 | Solution #3: AI/ML model authorization and retrieval p. 17
|
| 6.4 | Solution #4: AI/ML model storage and sharing security p. 20
|
| 6.5 | Void p. …
|
| 6.6 | Solution #6: Anomalous NF behaviour detection by NWDAF p. 23
| 6.6.1 | Introduction p. 23
|
| 6.6.2 | Solution details p. 24
| 6.6.2.1 | General p. 24
|
| 6.6.2.2 | Collection of security related log data of NFs via NFs EventExposure APIs p. 24
|
| 6.6.2.3 | Collection of security related log data of NFs via OAM p. 25
|
|
| 6.6.3 | Evaluation p. 28
|
|
| 6.7 | Solution #7: Secured and authorized AI/ML model transfer and retrieval p. 29
|
| 6.8 | Solution #8: Protection of data and analytics exchange in roaming case p. 32
|
| 6.9 | Solution #9: Anomalous NF behaviour event related data collection and anomalous NF detection p. 34
|
| 6.10 | Solution #10: Authorization of AI/ML model sharing between different vendors and usage of one-time URLs p. 37
|
| 6.11 | Solution #11: Secured and authorized AI/ML model sharing between different vendors p. 40
|
| 6.12 | Solution #12: Secured and authorized AI/ML model sharing between different vendors p. 43
|
| 6.13 | Solution #13: Support authorization of AI/ML model sharing By NWDAF containing MTLF p. 45
|
| 6.14 | Solution #14: Protection of data and analytics exchange in roaming case using Secure Multi-party Computation p. 48
| 6.14.1 | Introduction p. 48
|
| 6.14.2 | Solution details p. 48
| 6.14.2.1 | Data Privacy Computing Function DPCF p. 48
|
| 6.14.2.2 | Data collection protection architecture based on Secure Multi-party Computation p. 49
|
|
| 6.14.3 | Evaluation p. 50
|
|
| 6.15 | Solution #15: Authorization of selection of participant NWDAF instances in the FL group p. 50
|
| 6.16 | Solution #16: FL GROUP AUTHORIZATION OF NWDAF(S) IN 5GC p. 51
|
| 6.17 | Solution #17: Authorization of FL Server and FL Client in FL group p. 54
|
| 6.18 | Solution #18: Solution for authorization in FL p. 56
|
| 6.19 | Solution #19: Access control for user plane data p. 58
|
| 6.20 | Solution #20: Cyber attack detection using an analytics function p. 60
|
| 6.21 | Solution #21: Authorization of data and analytics exchange in roaming case p. 63
|